Packet Protector

Packet Pushers
undefined
Mar 31, 2026 • 57min

PP103: FireMon Brings Clarity to Firewall Rule Chaos (Sponsored)

Firewall policies are the heart of network security, but over time they can become a tangled mess. Rules might be outdated, or conflicting, or fail to address new applications, services, and risks. Add in remote locations and public cloud deployments, and you’ve got a serious headache for security and network teams. On today’s sponsored show... Read more »
undefined
Mar 24, 2026 • 56min

PP102: What’s Driving SASE Adoption?

Spending on SASE, which combines SD-WAN and cloud-delivered security, is forecast to nearly triple over the next few years, according to Dell’Oro Group. Today on Packet Protector we talk with that forecast’s author about what’s driving that spending. We also explore how SASE vendors are differentiating, architectural considerations for SASE deployments, pros and cons of... Read more »
undefined
Mar 17, 2026 • 44min

PP101: Hackers Tap Intune to Wipe Windows Devices; Tricksters Trump E2E Encryption

On today’s news roundup we assess the White House’s new US cyber strategy (bellicose, bombastic, and boiler-plate), discuss a cyberattack attributed to Iran that used Windows to wipe thousands of devices, and dig into a Microsoft update on Entra passkeys. JJ isn’t impressed with new research that bypasses Wi-Fi client isolation, corporate spyware gets a... Read more »
undefined
Mar 10, 2026 • 43min

PP100: Building and Securing AI Agents – A Case Study

Kyler Middleton, a software engineer and DevOps lead who builds internal AI bots for healthcare, describes designing private Slack/Teams assistants and hosting models on AWS for data privacy. She discusses moving from bots to agentic AI with tool use, auditing and OAuth-backed authorization, cross-system workflows, logging and guardrails, and unexpected benefits like surfacing stale company docs.
undefined
Mar 3, 2026 • 53min

PP099: The Care and Feeding of Kerberos for Windows Environments

Today we’re going to learn about the care and feeding of a three-headed dog named Kerberos. Developed at MIT and released in 1989, Kerberos is a free, open source authentication protocol that uses cryptographic keys to protect identity data as it crosses a network. Today, Kerberos is the backbone of Windows authentication. We’ll dive into... Read more »
undefined
Feb 24, 2026 • 58min

PP098: What Goes On Inside a Firewall?

On today’s show, we pop the lid off of a firewall (figuratively speaking) to understand what’s inside. We talk about how a packet moves through various packet-processing elements inside a firewall, how header analysis and de-encapsulation work, which hardware component has the biggest impact on performance, why stateful inspection still matters in an age of... Read more »
undefined
Feb 17, 2026 • 44min

PP097: How and Why to Turn the Browser into a Universal Security Agent (Sponsored)

With the rise of cloud services and SaaS, the browser has become a primary productivity tool. It’s also a primary vector for malware, phishing, identity theft, data leaks, and other risks. On today’s sponsored episode with Palo Alto Networks, we dive into browser security. We discuss risks to the browser and how they differ from... Read more »
undefined
Feb 10, 2026 • 51min

PP096: Taking Note of a Notepad++ Attack; Telnet and NTLM Are Still a Thing?

A roundup of high-risk supply-chain and software compromises, including a Notepad++ hosting breach and remediation steps. Discussion of a decade-old Telnet exploit targeting internet-facing devices. Coverage of Microsoft’s multi-year plan to retire NTLM and migration suggestions. Reports on voice-phishing toolkits that relay MFA, shadow AI risks from unapproved tools, and exposed API tokens fueling attacks.
undefined
8 snips
Feb 3, 2026 • 54min

PP095: OT and ICS – Where Digital and Physical Risks Meet

Sam Van Ryder, co-founder of CyberSec Community and Dragos strategic account lead, brings OT/ICS security and engineering chops. He discusses why industrial systems matter, how ransomware and nation-state actors target OT, the IT/OT convergence risks, and practical visibility, patching limits, and incident response approaches for physical-critical environments.
undefined
Jan 27, 2026 • 1h 10min

PP094: Understanding OAuth and Reducing Authorization Risks

OAuth is a widely used authorization (not authentication) protocol that lets a resource owner grant access to a resource using access tokens. These tokens define access attributes, including scope and length of time. OAuth can be used to grant access to human and non-human entities (for example, AI agents). OAuth is increasingly being abused by... Read more »

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app